General
-
Target
mal.zip
-
Size
749KB
-
Sample
220906-p7317adbh4
-
MD5
51e169f506279333e61b92b046a7d261
-
SHA1
dbf28ccaa1e3b3dddb60bdcca7394f0eadc6dd56
-
SHA256
6afd66a8052fcc6f5058b53fd7c57cb37d2e05633a7cc9f073a7039d45d98cd5
-
SHA512
424924ccd46b130f48d0055624ada5334912deb799dafbb322799eebc15e1a1b1d79a7345699f7eede3404ac336018cf66fed77acf2b9a0f889f80fa59aca760
-
SSDEEP
12288:tm+YfJ9BD4mfShqgTKpyiKy1MST2osx5p3DUyEqq6Ony8ZuJisnK40YGoHzXE03w:EpJ9BRfShiQW1tKosnYyEeHJisnGtQXU
Static task
static1
Behavioral task
behavioral1
Sample
meaterialorders.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
meaterialorders.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
www.warkarwaka.duckdns.org:6454
Targets
-
-
Target
meaterialorders.exe
-
Size
996KB
-
MD5
fc9a563b2c81a36b5faa6832695d59ef
-
SHA1
1f49d88c095ac07bacc27b2de94affb5b4246611
-
SHA256
a6c334e0bf23b3228bd86b455ee16a5f9675ac453f8e5ab0de66ab8824cecaa0
-
SHA512
3c5dd0db3d35ef54ff641356ded4248806a0a7c83cd0c99518ffc2551a7fb6db09f95f4d5176db7af5344f9cada6c602ab1994d947c68a649c816e9c447a596a
-
SSDEEP
24576:adNH1IqAS7ydN41p5Mtzqonte45WxGUSJw/BA0Uk5Wfw:aTvAHMhmZnk4wV/BJUk5WY
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-